Category: computers

How Indian EVMs are hacked – RFID components most likely – like a crystal radio reciever set

If the ICs used in the EVMs are not manufactured in India, then countries like UK or USA are honour-bound to add undocumented software routines and components to the chips.

  • If EVM software is hardcoded into the chips, then undocumented code pathways can be included at the chip manufacturer’s end at the behest of countries like US/UK. If the code is stored in flash memory, then code or the final tally can also be flashed or compromised by EC officials. It is unlikely that the EC has chosen flash memory-based chips. So, it must be the first case.
  • The chips could have RFID elements that could leak vote count data to specially made RFID readers. After the Punjab elections, Modi seems to have received advance word about the votes cast. As a defensive measure, he asked his ministers to show details of tours they undertook to defend the demonetization exercise. This proves that someone was able to scan all the EVMs and realize that BJP-SAD combine had did not gather enough votes.
  • Another more cumbersome tactic is to use EMI readers individual vote counts. This is unlikely to be case.
  • RFID chips do not require power. The radio waves emitted by the scanners provide the power for the RFID chips to emit data. The same concept can also be used to write fresh data into the EVMs. The vote count can be changed by activating unknown code pathways and components in the chips. This is how BJP manages to win seats in places where Muslims are in majority.

When BJP was repeating “Modi Wave! Modi Wave! Modi Wave!”, they were really telling the truth. Similar to how a crystal radio receiver set uses power from AM/MW broadcast radio waves to power a small earphone speaker, RFID components in the EVM chips are activated by radio waves to hack and manipulate the vote count.

What the EC has done or EVM manufacturers such as ECIL or BEL have done is protect against physical tampering.


Most coin-operated phones in India can be hacked using tones generated by pressing certain numbers on a mobile phone. This does not require physical tampering of the machines.

When EC officials says the EVMs are tamper-proof, they are right. For these simple-minded government officials, hacking means physical tampering.

EC has challenged political parties to hack the machines under control conditions. This will not work. The EC should give each political party at least 10 sample EVMs. The political parties should be able to take the EVMs away with them. Hardware security professionals hired by political parties will then be able to study the machines at leisure – say for a month. After that, these professionals can demonstrate hackability on fresh EVMs under control conditions set by the EC. Or, at the least, they can point out unwanted components in the EVM chips, which the EC should be duty-bound to explain.

Advertisements

“Facial video capture and reenactment” software make it easy to create fake videos

Terrorists and other criminals can claim CCTV footage as fake. Even fake godmen like Nithyananda can absolve themselves of any disrepute. Intelligence and investigative agencies can manufacture false evidence for their false cases and false-flag terrorism acts. Despite so much advancement in technology, all that Obama got for his belated fake birth certificate was a total fail. Hypnotism and mind-altering drugs has powered many mass-shooters in America.

 

 

Microsoft Office Ribbon sucks – Julie Larson-Green should design prison complexes instead of software UI

Nobody will ever get out of the maze.

The only ribbon you will ever need is a custom one. Right-click on the stupid ribbon and create a new tab. Drag and drop all the commands you want on that tab. Disable all other tabs.

Microsoft Word can export your custom toolbar settings to a file named as “Word Customizations.exportedUI” so make sure you do that for backup and for easy import to other Office installations.

SCREENSHOT-Microsoft-Word-the-only-ribbon-you-will-ever-need-ribbon-sucks

How to block Facebook ads & junk DIVs with Opera JavaScript or GreaseMonkey script

I created the Moral Volcano Facebook page only to post on Natural News. They have moved to Disqus and don’t require Facebook anymore. Now, this wordpress blog automatically reposts everything to Twitter and Facebook. So, the ads and junk on Facebook don’t bother me. I recently created an Opera User JS and Greasemonkey script to block junk on Twitter and wondered if the same could be done for Facebook too.

animation-facebook-ad-blocker-user-js-greasemonkey-javascript

Opera User JS to block Facebook Ads and other junk

window.opera.addEventListener(
  "BeforeEvent.load", 
  function(e) {
    if (e.event.target instanceof Document) {
      try {
        disableEveryThing();
      } catch (e) {
        console.log(e);
      };
    }
  },
  false);
  

function disableEveryThing() {
  var oSE = document.createElement("style");  
  oSE.innerHTML = 
    "*[role=\"complementary\"]" +
    "{ display: none!important; } \n" +
    "*[role=\"main\"] { width: auto!important; } ";
  
  document.getElementsByTagName("head")[0].appendChild(oSE);
}

Greasemonkey Script to block Facebook Ads and Junk DIVs

// ==UserScript==
// @name        Block Junk on Facebook
// @namespace   https://www.facebook.com/
// @description %description%
// @include     https://www.facebook.com/*
// @exclude     %exclude%
// @version     1
// @grant       none
// ==/UserScript==

document.addEventListener("DOMContentLoaded", disableEveryThing(), false);

function disableEveryThing() {
  var oSE = document.createElement("style");  
  oSE.innerHTML = 
    "*[role=\"complementary\"] { display: none!important; } \n" +
    "*[role=\"main\"] { width: auto!important; } ";
  
  document.getElementsByTagName("head")[0].appendChild(oSE);
}

On Hardware Secrets – USB-to-USB bridge cables

I keep myself updated on the latest hardware articles on AnandTech and TomsHardware.

When I got my current PSU and GPU I couldn’t find a review anywhere, except on HardwareSecrets.com. Now, they now have a good article on USB-to-USB cables – the ones that will provide four times the bandwidth of a LAN cable.

http://www.hardwaresecrets.com/article/Connecting-Two-PCs-Using-a-USB-USB-Cable/248

usb-to-usb-bridge-cable

Planned Obsolescence – Real reasons behind Heartbleed propaganda and GoogleBot’s new-found deference towards HTTPS sites

Heartbleed saga meant new SSL certificates for websites and new digital signatures for Trusted Certificate Authorities (CAs). Google Search ranking HTTPS sites over HTTP sites websites would make everyone get new SSL certificates. That means a whole lot of smartphones will have to upgrade, even though they are in good working condition.

I have a Sony Ericsson X10 Mini Pro phone, which was bought in 2010. It as good as new except for some slight wear on the back cover. It takes great photos. Its auto-focus ability has not been matched by any new phone that I have. Yet, it cannot load Twitter, Facebook and many other HTTPS websites on its browser.

I have another LG phone bought in 2012, bought only for my CBS research, which has the same issue. It can’t load several HTTPS websites.

This is because most of these HTTPS websites are using new SSL certificates. When a phone makes a request to a HTTPS, SSL certificates of websites are matched against certificates of Trusted Certificate Authorities (CAs) installed in the phone. Sites like Twitter and Facebook are using SSL certificates that are signed against newer Trusted CAs, none of which are available in these old phones. Android does not provide an option to install certificates of new Trusted CAs.

Android phone manufacturers make one or two quick updates that I guess make no difference to the longevity of the installed certificates. This meant that the Android phones would not work with some websites and some apps would also stop working.

That did not mean people abandoned the phones. They still stuck to their phones. HOW CAN YOU FORCE THESE PEOPLE TO UPGRADE?

ENTER HEARTBLEED. Heartbleed was accompanied with a media blitzkrieg that was never seen before. Somehow a logo was quickly created and the very first new flashes had the final logo in full glory. USB devices poses a bigger threat to IT security than any other and everyone ignores it like it does not exist at all.

Some Western intelligency agency decide to deliberately out one of their moles who had put an innocuous bug in the widely used OpenSSL library. He was asked to take the fall and he quietly. Linus Torvalds’ father has claimed that NSA had contacted his son about some national security kernel patches to Linux (http://www.omgubuntu.co.uk/2013/11/nsa-ask-linus-torvalds-include-backdoors-linux-father-says-yes). Linus later claimed that he had been joking. One FBI contractor claimed that he was asked compromise the OpenBSD distribution. He went public after his gag order expired.

The Heartbleed propaganda asked all websites to get new SSL certificates. Many followed the advice but most did not. Despite, all that propaganda!

That’s when I guess the intelligence agency put in a call to Eric Schmidt. Soon enough, Matt Cutts, the man who has more Ts in his name than vowels or other consonants, or the Google Search blogger in the inside made a post that Google would henceforth be ranking HTTPS over HTTP.

Now, security is one thing but dealing a blow directly on your search referrals or page views or in absolute layman terms HITS is another. That’s got to hurt!

The thinking seems to have gone like this: “Every website out there is going to switch to HTTPS and now everyone gonna upgrade their phones with the latest [surveillance] capabilities.” WELL… YOU FOOLS. YOU MORONS. YOU DIMWITS. It worked out exactly as you planned, didn’t it?

I think you should call the effort has been a failure. Admit it, ULTRAMAROONS.  Most websites are doing a wait-and-watch attitude. Unlike years before, Google Search is just one among many sources of traffic. And, websites are not the only frontend that is interfacing with the customer. Mobile apps bring in a lot of business. For many websites, most inbound links are coming from Twitter and Facebook, although these visitors are extremely fickle-minded and have low attention span. In other words, they are mostly one-time visitors. Webmasters just need to convert these to steady customers. They are no longer need to tie themselves in knots to please GoogleBot.

What next? I guess they need to destroy some big websites and cause real damage. Yahoo or Ebay losing some encrypted passwords is not taking the right effect. Blame it on ISIS or SHAM or whatever. Israel is still raining bombs on Palestinian homes, schools and hospitals in Gaza. Every kind of coverup tactic has been tried. A Hollywood celebrity has been bumped off. A phony race “situation” had been tried. Israel could really use something big. What’s next? Think!

Oracle & VmWare – Two important companies missing from Cloud Computing battlefield – Customers forced to deal with half-boiled offerings from Google & Microsoft

Cloud computing is basically virtualization moved to the Web. VirtualBox and VmWare are the biggest names in virtualization. Yet, both of them have left the field open to half-boiled products from Google and Microsoft. The products may be half-boiled but that helps these companies charge more for adequate performance, by the hour and by the minute.

Larry Ellison-led Oracle buys some company.

Larry Ellison-led Oracle buys some company.